Sciweavers

430 search results - page 75 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
DEBS
2008
ACM
15 years 24 days ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 1 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
SAC
2000
ACM
15 years 4 months ago
WCML: Paving the Way for Reuse in Object-Oriented Web Engineering
Since 1990 the Web has changed from a distributed hypertext system to an efficient environment for application delivery. Due to the legacy of the Web implementation model the deve...
Martin Gaedke, Christian Segor, Hans-Werner Geller...
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 1 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
ACL
1998
15 years 1 months ago
Dialogue Act Tagging with Transformation-Based Learning
For the task of recognizing dialogue acts, we are applying the Transformation-Based Learning (TBL) machine learning algorithm. To circumvent a sparse data problem, we extract valu...
Ken Samuel, Sandra Carberry, K. Vijay-Shanker